HomeMy WebLinkAbout28 0545 System Integration_Technical Guideline Spec_2024-07-12Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 1
SYSTEM INTEGRATION 28 0700 - 1
SECTION 28 0545
SECURITY SYSTEM INTEGRATION
PART 1 - GENERAL
1.01 SUMMARY
A. Section includes the provision of mechanisms which shall support the exchange and
recognition of information and commands between Electronic Security Systems (ESS) at
TCCD facilities.
1.02 DESCRIPTION
A. General Description: This specification section covers the provision of mechanisms which
will support the exchange and recognition of information and commands between various
security system applications to automate functions at the Security Monitoring Center and
Police Department Dispatch.
B. Contractor shall coordinate with providers of systems listed herein to provide equipment,
software, and configuration that will support the required functionality and performance.
C. Systems to be connected for data sharing:
1. EACS (Lenel OnGuard) and VSS (Milestone xProtect)
2. ECS (system to be selected) and VSS
3. EACS and ENS (Alertus)
1.03 RELATED WORK
A. Provide the work in accordance with Section 28 0000, Security System General
Requirements.
1.04 SHOP DRAWINGS & EQUIPMENT SUBMITTAL
A. Provide the work in accordance with Section 28 0000, Security System General
B. In addition to the requirements of Section 28 0000, provide the following information for
each system to be integrated:
1. Describe the integration architecture between systems. Provide a single-line diagram
showing relationships between integrated components. The contractor may use the
construction document drawings as the basis for these integration drawings.
2. If a central integration processing component or user-interface (server, application)
is proposed, describe the hardware and application software proposed.
3. A detailed description of how the interface will be accomplished between each
system, including proposed connectivity, hardware, software, language, protocols,
procedures, and standards.
4. Proposed Software Development Kit (SDK) or Application Interface (API) and
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 2
SYSTEM INTEGRATION 28 0700 - 2
Version, where an SDK/API already exists from the component manufacturer.
Provide development and capabilities information on the SDK/API and its proposed
use on this project.
a. An existing API exists for the EACS/VSS integration. Contractor shall include
all licenses required to implement the integration for this project.
5. Development specification for custom software development, where the interface
must be created specifically for the project.
6. A detailed list, or matrix, of information, commands, and other elements of the
interface, delineating exactly what functions will be supported between each system,
and how they will work.
1.05 OPERATIONS AND MAINTENANCE MANUALS
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.06 WARRANTY
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.07 QUALITY ASSURANCE
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.08 SERVICE AND MAINTENANCE
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.09 TRAINING
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.10 EQUIPMENT COMPATIBILITY REQUIREMENTS
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.11 OWNER’S RIGHT TO USE EQUIPMENT
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
1.12 TECHNICAL REQUIREMENTS, ELECTRONIC SECURITY SYSTEM (ESS) INTEGRATION
A. General
1. The Contractor shall be responsible for providing hardware and software interfaces
to achieve the specified system performance described herein and, by reference,
realize absolute and seamless compatibility with the related component systems.
2. The Contractor shall ensure system additions and modifications provided under this
scope of work have no negative effect on the individual components and systems,
and their core functionality, and no permanent effect beyond that specified or
implied by the scope of work.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 3
SYSTEM INTEGRATION 28 0700 - 3
3. Systems should be connected together using encrypted authenticated
communications following the manufacturer's recommendation and TCCD
guidelines for zero-trust communications.
B. Purpose
1. Integration is the process of designing, deploying, and configuring independently
operating systems with the ability to request, receive, extract, process, and act upon
information from other systems.
2. Successful system integration must address three fundamental issues:
a. Functionality: What information is needed, how it is to be requested and
processed, and what functions or activities need to occur upon receipt of the
information.
b. Connectivity: How systems will be connected together to support the
communication of information and commands. (Special interfaces, wiring,
networks, databases.)
c. Communication: How information will be communicated between systems.
(Instruction sets, language, protocols, formats, priority)
C. Environment
1. Infrastructure and Connectivity
a. Communications between the EACS, VSS, and ECS systems/servers shall be
completed under a separate project. Primary integration licensing between
the EACS and VSS has been obtained by TCCD. The contractor shall confirm
completion of communications between the systems with TCCD Electronic
Security Department.
b. The operator workstations responding to the automated function are located
in the Security Monitoring Center and PD Dispatch located at the Trinity River
campus.
D. Attributes
1. The attributes of the integrated environment are primarily defined by the
subsystems that are to be integrated. Verify existing system components to be
expanded by this project.
2. Integrated systems comprise of the processors, software, electrical control panels,
data gathering panels, special data interfaces, and converters required to allow
systems to communicate with each other, process information, and allow users to
program and perform operations.
3. The following systems will be a part of the integrated environment:
a. Electronic Access Control System (EACS) – Lenel OnGuard
b. Video Surveillance System (VSS) – Milestone xProtect Corporate
c. Emergency Phone System (ECS) – TBD
d. Emergency Notification System (ENS) Alertus
E. Functions
1. User Interface: In instances where data messages are not automatically sent
between systems based on the interface but require the user to enter data to create
a data transfer stream, the interface shall use a graphical type interface to set up the
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 4
SYSTEM INTEGRATION 28 0700 - 4
communications requirements. The user shall not be required to enter program
code to make the interface functional when adding new data streams.
2. The system shall provide the following automated processing rules, at a minimum:
a. The object of “system integration” is to automatically configure the system to
display, record and report appropriate system activity to various elements of
the system. Automatic configuration can free operators from difficult control
tasks, give the operator more time to respond to events, reduce operator error,
and ensure critical system tasks occur consistently.
b. General Interface Description: System integration shall accomplish the
following functions.
1) The ESS shall provide automatic camera call-up on alarm activation.
Alarms generated by the EACS shall be transmitted to the VSS to display
one or more cameras associated with the alarm.
2) The ESS shall provide automatic camera call-up on ECS activation. When
an ECS is activated the call shall be transmitted to the VSS to display one
or more cameras associated with the ECS station initiating the call. This
integration shall allow ECS calls to be answered from the VSS operator
workstation application at the Security Monitoring Center of Police
Department Dispatch.
c. Event-Initiated Interface, General:
1) The system shall support the capability to send and receive alarm and
control messages between designated systems via a secure encrypted
network communications link, using API, XML, or other industry-
standard communication languages and formats, and shall act upon
those messages received.
2) Where integration may require the implementation of other than a
network-based communications link, Contractor shall propose such
integration for approval, before proceeding with the work.
3) All software routines required to perform the required data-interface
with external equipment and controls will be fully developed, installed,
tested and supported by the Contractor.
4) Communication of event information between systems shall take place
automatically and immediately, when the event is sensed by the system.
5) “Hard-wired” interfaces used to support interactive video surveillance
cameras, intelligent video, threat-based control, and other event-
initiated functions shall not be acceptable, except as otherwise noted
herein or shown on the design drawings.
3. VSS/EACS System Integration: Upon receiving event/alarm information from the
EACS, the VSS shall transmit camera pre-positioning commands to applicable cameras,
and shall cause the system to process, display, and record applicable PTZ and fixed
cameras at a predefined frame-rate and resolution.
a. EACS Interface: When an alarm is received by the EACS the system shall
automatically generate a message and send it to the VSS. The EACS/VSS
integration application shall be design to allow the user to select an EACS
device, select the alarm/event condition and then select the camera or cameras
to be displayed on that alarm/event. The interface shall allow the user to select
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 5
SYSTEM INTEGRATION 28 0700 - 5
which cameras are displayed and which monitor(s) and panes within the alarm
monitor window those camera images are displayed. The interface can be
designed for the user input to be done on either the EACS or VSS. The contractor
shall coordinate with Lenel and Milestone to determine the best way to
implement the interface. Upon receiving an alarm message, the VSS shall
1) Automatically select, position, and focus one or more cameras on areas of
concern;
2) Automatically re-configure recording for the selected cameras, to record
them in an enhanced format, at the highest available resolution, frame
rate, and quality (all other cameras remain at their pre-programmed
format);
3) Automatically display the selected cameras on one or more monitors,
client workstations, and other display devices, in a pre- selected
configuration (single or multi-camera views).
4) The following alarm/events shall be configured for automatic camera
call-up:
a) Door Forced
b) Door Propped
c) Invalid Card read
b. EACS/VSS Configuration: For every EACS device that can provide an alarm
condition (door position switches and duress switches) the VSS shall display 4
or more cameras associated with that alarm activation. When a Security
Monitoring Center Operator or PD Dispatch Operator acknowledges the alarm,
the cameras shall be displayed in a 2x2 format on their monitor.
1) For perimeter doors the associated cameras shall be the interior camera
viewing the door and a second interior camera that will be able to
monitor the person once they are no longer in the view of the primary
interior camera. The 3rd camera shall be the closet exterior camera
viewing the perimeter door and the nearest exterior PTZ camera. Note
that a number of exterior cameras have multi-imagers. The contractor
shall select the imager that is viewing the door.
2) For stairwell alarms the following cameras shall be automatically
displayed: The two corridor cameras on the floor where the alarm occurs,
the elevator lobby camera on the floor that generates the stairwell alarm,
the cameras viewing the exit doors on floors 1 and 2, and the cameras
viewing the elevator lobby on floors 1 and 2.
3) When there is more than one alarm the alarms shall be stored in the
alarm queue and the operator shall be able to select any alarm and its
associated cameras.
c. Visual Tracking: The Milestone system provides a visual tracking function. This
function allows the addition of semi-transparent shapes, or overlays, on a
camera view that link to another camera. For each camera the contractor shall
program an overlay for each camera adjacent to a camera. The overlays shall
be placed on the camera view on the left, right, top, and/or bottom to indicate
the relative location of the adjacent camera as a person walks out of the view.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 6
SYSTEM INTEGRATION 28 0700 - 6
The number of overlays are dependent on the available directions a person can
move out of view of a camera. There shall be a minimum of two overlays per
camera. For multi-imager cameras the overlays may link to a separate stream
within the same camera.
4. ECS/VSS System Integration: Upon a call activation from the ECS, the VSS shall
transmit camera pre-positioning commands to applicable cameras, and shall cause
the system to process, display, and record applicable PTZ and fixed cameras at a
predefined frame-rate and resolution.
a. Event identifying the calling device is sent from the ECS to the VSS and pre-
configured cameras are displayed on the Security Monitoring Center video wall.
Coordinate with TCCD Electronic Security Department to determine which
monitor shall display the associated cameras.
b. The call is annunciated at the two Security Monitoring Center workstations.
1) If neither station answers the call with 10 seconds the call rolls over to
the PD Dispatch Operator’s workstation.
2) If the PD Dispatch Operator doesn’t answer the call with 10 seconds the
call forward to the PBX operator.
c. One of the two Security Monitoring Center workstations answers the call and
establishes communication to the calling device.
1) The ECS sends an event to the VSS displaying the pre-configured cameras
on the workstation answering the call.
2) The operator shall have the capability to display the cameras on their
workstation and/or the videowall monitor in front of their workstation
if needed. This will allow staff to view the event without interfering with
the operator’s tasks.
3) The Security Monitoring Center staff member answering the call
communicates with the calling party and assess the situation. If required
by operation protocols the operator dispatches appropriate staff to
respond.
4) If the Security Monitoring Center operator identifies a person of interest
within view of the camera and the person of interest begins to leave the
area, they will move into view of one of the adjacent cameras. The
Security Monitoring Center operator can click in the window of the
camera viewing the person and that camera will become the primary
camera and move to the large window with new secondary cameras
displayed in the smaller windows. The Security Monitoring Center
operator can continue to follow the person of interest while they are
within view of a camera connected to the VSS. This function allows an
operator to follow an individual without needing to know which camera
needs to be displayed.
d. When the operator disconnects from the calling device a message will display
on the ECS screen asking the operator to end the incident. The operator will
have two options;
1) End the incident which will send an event to the VSS to set the video wall
monitors and the operator’s monitor return back to normal operations
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 7
SYSTEM INTEGRATION 28 0700 - 7
or;
2) The operator can select to continue the incident even after
communications had ended to allow the operator to continue to follow
the person of interest. Once the operator has determined the incident is
no longer active, they can end the incident which will put all involved
monitors back to normal operation.
5. The integration shall provide access to the ECS system directly from the VSS
application.
6. An operator shall be able to answer a ECS call directly from the VSS application.
7. The integration shall provide a list of ECS devices on the VSS application. The
integration shall provide an all call/group call function from the VSS application. This
function shall provide a manual voice announcement of a prerecorded message to be
selected for each group. The prerecorded function shall provide a pull-down list of
messages with the capability to repeat the message for a set number of times
selectable by the user.
PART 2 - PRODUCTS
2.01 INTEGRATION LICENSES
A. Video Surveillance System (VSS)
1. Provide Milestone license required for integration to the Lenel/S2 EACS
a. Milestone Part XPABL – XProtect Access Control Base License
2. Provide Milestone licenses required for each device integration between Lenel/S2
and Milestone.
a. Milestone Part APADL – XProtect Access Reader License
b. Provide the number of licenses required for the number of Lenel/S2 readers
that are communicating with the Milestone system.
3. Include 1-year warranty on software and labor.
B. Emergency Call System (ECS)
1. Provide license required to integrate the ECS with the VSS
2. Provide licenses as required for each ECS device connected to the VSS.
3. Include 1-year warranty on software and labor.
C. Provide 16 hours of Milestone Pro Services to assist in the installation and configuration of
the VSS to send event messages from the ECS to the VSS to provide automatic camera call-
up. The Pro Services can also be used to assist the contractor in any other programming and
configuration issues that may arise.
D. Provide Snap Surveillance FMX software to provide the capability to follow targets as
described above. Snap Surveillance is a third-party software program that functions with
Milestone XProtect software. Provide the software and any required licenses to meet the
specified functionality.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 8
SYSTEM INTEGRATION 28 0700 - 8
PART 3 - EXECUTION
3.01 GENERAL
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
3.02 COORDINATION
A. The contractor shall coordinate with each of the manufacturers to implement the data
communications interfaces between each system.
B. The contractor shall coordinate with TCCD Electronic Security Department to implement
the interfaces and user interface to meet Security Monitoring Center and PD Dispatch
operations requirements. The contractor shall coordinate how the operator’s actions will
determine what the systems shall do.
C. The contractor shall coordinate the requirements from each manufacturer involved in any
integration scheme to provide professional services as needed to implement the
integration requirements.
3.03 SYSTEM CONFIGURATION
A. EACS/VSS Configuration Tasks:
1. General: The contractor shall comply with all programming requirements as provided
by Milestone and Lenel/S2 for implementation of the communications and software
interface between the systems.
2. The contractor shall load any required software on the EACS and VSS to provide the
required interface functions. The contractor shall provide any licenses required for
the EACS and VSS to implement the communications and software interface functions.
The contractor shall configure the software to comply with all TCCD requirements.
TCCD will provide IP addresses as needed and coordinate required port settings and
any other configuration settings required to allow communication between the EACS
and VSS to provide the required functions.
a. Provide a license for each door to be integrated.
3. Configure IP addresses and ports to allow communications between the EACS and
VSS servers. Coordinate all IP addresses and port configuration with TCCD.
Coordinate with TCCD to ensure all cyber security requirements are addressed.
4. Set-up and configure EACS and VSS to send messages to the VSS on EACS designated
alarm point activation and display the cameras in the designated window view on the
VSS. The contractor shall create a schedule of alarm/events generated by the
Lenel/S2 system and the associated cameras to be displayed. Refer to the attached
sample schedule to identify how designated alarms and corresponding camera call-
ups may be configured. The contractor may submit their own schedule for review by
TCCD.
5. Assign primary and secondary cameras associated with each EACS alarm/event.
Configure VSS screen layout for each configuration. The primary camera shall be in a
large window with the secondary cameras in smaller windows adjacent to the
primary camera. Initial configurations:
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 9
SYSTEM INTEGRATION 28 0700 - 9
a. Configuration 1: Large window in the top left quadrant of the monitor with
three smaller windows below and two to the right (6 total views). (Refer to
attached layout)
b. Configuration 2: Large window in the top center of the monitor with four small
windows below and two to the right and left (9 total views). (Refer to attached
layout)
6. Configure the Milestone system to provide the capability of the operator to select a
camera and have secondary cameras displayed as described in Configuration 2 in
item 5.b. above. This configuration shall allow an operator to follow a person
throughout the facility as described in Sequence of Operation item 7. a. 3) d) below.
This shall apply to all cameras located at each campus or facility.
7. Sequence of Operation.
a. EACS alarm/event is activated.
1) The EACS sends a message to the VSS and pre-configured cameras are
displayed on one of the monitors of the video wall.
2) The alarm/event is annunciated at both the Security Monitoring Center
and PD Dispatch workstations. The alarm will display the Lenel/S2 alarm
screen with a blinking message in red and provide an audible sound to
alert the operator.
3) One of the workstations responds to the alarm/event and establishes
control of the alarm/event by acknowledging the alarm.
a) The EACS sends message to the VSS displaying the pre-configured
cameras on the workstation responding.
b) The pre-configured cameras are also displayed on the Security
Monitoring Center video wall monitor directly above the
workstation answering the call and the center monitor of the video
wall will display a map of the site or specific floor plan related to
the location of the alarm.
c) A dialog box related to the alarm shall pop-up with instructions to
the operator in the top section of the pop-up window and the
capability to enter the steps taken to respond to the alarm in the
lower section of the pop-up window. (Note the exact orientation of
the alarm message window and text message window may vary
based on Lenel/S2 specific programming).
d) If the operator identifies a person of interest within view of the
camera and the person of interest begins to leave the area, they will
move into view of one of the adjacent cameras. The operator can
click in the window of the camera viewing the person and that
camera will become the primary camera and move to the large
window with new secondary cameras displayed in the smaller
windows. The operator can continue to follow the person of
interest while they are within view of a camera connected to the
VSS. This function allows an operator to follow an individual
without needing to know which camera needs to be displayed.
4) When the operator is finished responding to the alarm/event they will
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 10
SYSTEM INTEGRATION 28 0700 - 10
clear the alarm. This will return the operator’s workstation and the video
wall back to their default settings. The alarm message, the cameras
recordings associated with the alarm and the text entered by the
operator shall be saved as an event for later retrieval to assess the alarm
and response.
8. Sequence of Operation (Alternate Bid #1)
a. This sequence of operation shall be the same as described in item 5 above with
the additional functionality.
1) When an operator responds to an alarm/event and displays the pre-
configured cameras on their workstation monitor and the video wall
monitor above their workstation the VSS shall display an associated map
of the facility based on the primary camera being displayed.
2) On the displayed map all the cameras connected to the VSS shall be
displayed.
a) The primary camera shall be displayed as a red icon to easily
identify the location of the primary camera.
b) The other cameras shall be displayed in an alternate color to
identify the cameras that an individual being monitored could walk
into the view of that would then allow that camera to be selected
as the primary camera. Coordinate color selection with TCC
c) As the operator selects a camera for viewing as the subject being
monitored moves into view of a different camera the new primary
camera shall be displayed in red to allow the operator to easily
identify the camera on the map the is being viewed as the primary
camera.
B. ECS/VSS Configuration Tasks:
1. The contractor shall load the ECS management software and maintenance software
of the VMWare server provided by TCCD. The contractor shall configure the software
to comply with all TCCD requirements. TCCD IT will provide IP addresses as needed
and coordinate required port settings and any other configuration settings required
to allow communication with all Emergency Call devices and the client workstations.
2. Coordinate with TCCD IT to set-up server OS image per TCCD requirements and as
required for the ECS software to operate properly and communicate with all devices.
3. Install and configure the ECS software on the provide VMWare server.
4. Install and configure the ECS client software on all Monitoring Center and PD Dispatch
workstations as designated by TCCD.
5. Activate all required licenses.
6. Begin transition of ECS devices from the campus IP phone system to the ECS.
a. Transition the first Emergency Call Station to the ECS and test operation at all
workstations.
b. Transition all remaining ECS devices to the ECS server and verify operation for
each.
7. Set-up and configure ECS and VSS to allow the ECS to send event information to the
VSS. Event shall be activation of the call button on an ECS device.
a. TCC shall provide a communication path between the ECS server and the VSS
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 11
SYSTEM INTEGRATION 28 0700 - 11
management server located in the Trinity River Data Center.
b. The Contractor shall be responsible to program the ECS and VSS to allow the
VSS to received event messages from the ECS and display the assigned cameras
based on the ECS device generating the event.
c. The Contractor shall include an “END EVENT” function in the VSS. The END
EVENT can be an icon on the monitor or a hot key on the keyboard. Activating
the END Event will return the video displays to the default configuration.
8. Assign primary and secondary cameras associated with each ECS device. Configure
VSS screen layout for each configuration. The primary camera shall be in a large
window with the secondary cameras in smaller windows adjacent to the primary
camera. Initial configurations:
a. Configuration 1: Large window in the top right quadrant of the monitor with
three smaller windows below and two to the right (6 total views). (Refer to
attached layout)
b. Configuration 2: Large window in the top center of the monitor with four small
windows below and two to the right and left (9 total views). Refer to attached
layout)
9. VSS Camera Configuration and Setup
a. The Contractor shall assign a primary camera for each ECS device. The primary
camera shall have the best view of the ECS device initiating a call. The
contractor shall create a schedule of alarm/events generated by the ECS and
the associated cameras to be displayed. Refer to sample schedule for additional
information.
b. The Contractor shall assign five secondary cameras to each primary camera.
The secondary cameras will be adjacent to the primary camera and shall be able
to view a subject if they are no longer in the view of the primary cameras. Refer
to the schedule for additional information.
c. The VSS shall be configured to assign five secondary cameras to each camera
within the scope of the project even if a camera is not used as a primary camera
related to events initiated by the ECS. This setup shall allow an operator to
follow a subject throughout the facility manually. The operator shall be able to
manually activated this feature even if an event has not occurred. Note: All
campus cameras have not yet been installed. It is possible a secondary camera
may not be available at the time of this project. In that instance one or more of
the secondary camera tiles may be blank and will be filled in when the other
projects related to camera installation are completed. Refer to the schedule for
additional information.
10. Sequence of Operation.
a. ECS device call button is activated.
1) Event identifying the calling device is sent from the ECS to the VSS and
pre-configured cameras are displayed on the center monitor of the
Security Monitoring Center video wall.
2) The call is annunciated at the Security Monitoring Center and PD
Dispatch workstations.
b. One of the workstations answers the call and establishes communication to the
calling device.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 12
SYSTEM INTEGRATION 28 0700 - 12
1) The ECS sends an event to the VSS displaying the pre-configured cameras
on the workstation answering the call.
2) The operator shall have the capability to display the cameras on their
workstation on the videowall monitor in front of their workstation if
needed. This will allow staff to view the event without interfering with
the operator’s tasks.
3) The operator answering the call communicates with the calling party and
assess the situation. If required by operation protocols the operator
dispatches appropriate staff to respond.
4) If the operator identifies a person of interest within view of the camera
and the person of interest beings to leave the area, they will move into
view of one of the adjacent cameras. The operator can click in the window
of the camera viewing the person and that camera will become the
primary camera and move to the large window with new secondary
cameras displayed in the smaller windows. The operator can continue to
follow the person of interest while they are within view of a camera
connected to the VSS. This function allows an operator to follow an
individual without needing to know which camera needs to be displayed.
c. When the operator disconnects from the calling device a message will display
on the ECS screen asking the operator to end the incident. The operator will
have two options;
1) End the incident which will send an event to the VSS to set the video wall
monitors and the operator’s monitor back to normal operations or;
2) The operator can select to continue the incident even after
communications had ended to allow the operator to continue to follow
the person of interest. Once the operator has determined the incident is
no longer active, they can end the incident which will put all involved
monitors back to normal operation.
11. Sequence of Operation (Alternate Bid #1)
a. This sequence of operation shall be the same as described in item 8 above with
the additional functionality.
1) When a Security Monitoring Center operator answers a call and displays
the pre-configured cameras on their workstation monitor and the video
wall monitor above their workstation the VSS shall display an associated
map of the facility based on the primary camera being displayed.
2) On the displayed map all the cameras connected to the VSS shall be
displayed.
a) The primary camera shall be displayed as a flashing red icon or
other graphic symbol to easily identify the primary camera being
viewed.to easily identify the location of the primary camera.
b) Note that the color selection can be modified by the user to be
easier to see if the colors selected herein are not acceptable.
C. The contractor shall program the layout of the cameras on the building site and floor plans.
CAD or PDF files of the plans shall be provided to the contractor by TCCD to create the maps.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 13
SYSTEM INTEGRATION 28 0700 - 13
3.04 WORKMANSHIP
A. Provide the work in accordance with Section 28 0000, Security General Requirements.
3.05 EQUIPMENT, RACK AND CONSOLE INSTALLATION
A. Provide equipment, rack, and console installation in accordance with Section 28 0000,
Security General Requirements.
3.06 GROUNDING PROCEDURES
A. Provide grounding of all systems and equipment in accordance with Section 28 0000,
Security General Requirements.
3.07 CONDUIT AND WIRE INSTALLATION PRACTICES
A. Provide conduit, wire and cable installation in accordance with Section 28 0000, Security
General Requirements.
3.08 IDENTIFICATION AND TAGGING
A. Provide identification of wire, panels, and devices in accordance with Section 28 0000,
Security General Requirements.
3.09 DATABASE PREPARATION, CHECKING, AND ACTIVATION
A. Provide database preparation, checking and activation for systems and equipment in
accordance with Security General Requirements, Section 28 0000.
B. Contractor shall coordinate with the TCCD to determine the required pre- programmed
surveillance, rule-setting, and event-initiated configurations.
C. The interface between the EACS and VSS for automatic camera functions on the VSS shall
be configured to allow operator input to select which cameras are associated with each
alarm and which monitor(s) the video will be displayed. Upon the VSS receiving an alarm
message the associated camera(s) shall be recoded per the camera alarm recording
settings programmed into the VSS.
3.10 START-UP RESPONSIBILITY
A. Provide start-up services for systems and equipment in accordance with Security General
Requirements, Section 28 0000.
3.11 3.11 SYSTEM PERFORMANCE TESTING AND ADJUSTING PROCEDURES
A. Provide performance testing, burn-in, and adjusting of systems and equipment in
accordance with Section 28 0800, Testing and Commissioning.
Tarrant County College District 2024-07-12
Technical Guideline Spec
Electronic Security Systems Page 14
SYSTEM INTEGRATION 28 0700 - 14
B. Performance Testing
1. Demonstrate the operation of each camera that is associated with an EACS
alarm/event.
2. Demonstrate the operation of each camera that is associated with each ECS phone.
3. Demonstrate automated call-up, pre-positioning, and graphical map control of each
camera, from the VSS GUI screens.
3.12 FINAL PROCEDURES
A. Perform final procedures in accordance with Section 28 0000, Security General
Requirements.
END OF SECTION